Syndetics cover image
Image from Syndetics

Cybercrime Investigation Case Studies An Excerpt from Placing the Suspect Behind the Keyboard

By: Shavers, Brett.
Material type: TextTextPublisher: Burlington : Elsevier Science, 2012General Notes: EBSCO PDA Program; Description based upon print version of record.Description: 1 online resource (49 p.).Content type: text Media type: computer Carrier type: online resourceISBN: 9780124095359 (electronic bk.); 0124095356 (electronic bk.).Subject(s): Computer crimes -- Investigation -- Case studies | Electronic evidence -- Case studies | Criminal procedure -- Case studies | Criminal investigation -- Case studiesGenre/Form: Electronic books. DDC classification: 363.25/968 | 364.973 Online resources: Access full-text materials at no charge: Summary: Cybercrime Investigation Case Studies is a ""first look"" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
E-book Davenport Library e-book E-book 363.25/968 364.973 (Browse shelf(Opens below)) Not For Loan mq595823

EBSCO PDA Program

Description based upon print version of record.

Cybercrime Investigation Case Studies is a ""first look"" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find

There are no comments on this title.

to post a comment.

Powered by Koha